Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14287

Опубликовано: 17 окт. 2019
Источник: debian

Описание

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.8.27-1.1package

Примечания

  • https://www.sudo.ws/alerts/minus_1_uid.html

  • Patch: https://www.sudo.ws/repos/sudo/rev/83db8dba09e7

  • Fix test regression: https://www.sudo.ws/repos/sudo/rev/db06a8336c09

  • Patch: https://www.openwall.com/lists/oss-security/2019/10/15/2 (1.8.5, 1.8.10)

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 7
redhat
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

CVSS3: 8.8
nvd
больше 6 лет назад

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

suse-cvrf
больше 6 лет назад

Security update for sudo

suse-cvrf
больше 6 лет назад

Security update for sudo